========================================================================== Ubuntu Security Notice USN-7149-1 December 11, 2024 intel-microcode vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: Avraham Shalev and Nagaraju N Kodalapura discovered that some Intel(R) Xeon(R) processors did not properly restrict access to the memory controller when using Intel(R) SGX. This may allow a local privileged attacker to further escalate their privileges. (CVE-2024-21820, CVE-2024-23918) It was discovered that some 4th and 5th Generation Intel(R) Xeon(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. THis may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-21853) It was discovered that some Intel(R) Processors did not properly restrict access to the Running Average Power Limit (RAPL) interface. This may allow a local privileged attacker to obtain sensitive information. (CVE-2024-23984) It was discovered that some Intel(R) Processors did not properly implement finite state machines (FSMs) in hardware logic. This may allow a local privileged attacker to cause a denial of service (system crash). (CVE-2024-24968) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.10 intel-microcode 3.20241112.0ubuntu0.24.10.1 Ubuntu 24.04 LTS intel-microcode 3.20241112.0ubuntu0.24.04.1 Ubuntu 22.04 LTS intel-microcode 3.20241112.0ubuntu0.22.04.1 Ubuntu 20.04 LTS intel-microcode 3.20241112.0ubuntu0.20.04.1 Ubuntu 18.04 LTS intel-microcode 3.20241112.0ubuntu0.18.04.1+esm1 Available with Ubuntu Pro Ubuntu 16.04 LTS intel-microcode 3.20241112.0ubuntu0.16.04.1+esm1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7149-1 CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984, CVE-2024-24968 Package Information: https://launchpad.net/ubuntu/+source/intel-microcode/3.20241112.0ubuntu0.24.10.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20241112.0ubuntu0.24.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20241112.0ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/intel-microcode/3.20241112.0ubuntu0.20.04.1